blob: 1de01eaec88490c6c24d669a6f02c6b4fc2e9959 [file] [log] [blame]
David Howellsc26fd692012-09-24 17:11:48 +01001/* X.509 certificate parser internal definitions
2 *
3 * Copyright (C) 2012 Red Hat, Inc. All Rights Reserved.
4 * Written by David Howells (dhowells@redhat.com)
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public Licence
8 * as published by the Free Software Foundation; either version
9 * 2 of the Licence, or (at your option) any later version.
10 */
11
David Howells57be4a72013-08-30 16:16:34 +010012#include <linux/time.h>
David Howellsc26fd692012-09-24 17:11:48 +010013#include <crypto/public_key.h>
14
15struct x509_certificate {
16 struct x509_certificate *next;
David Howells84aabd42014-07-01 16:40:19 +010017 struct x509_certificate *signer; /* Certificate that signed this one */
David Howellsc26fd692012-09-24 17:11:48 +010018 struct public_key *pub; /* Public key details */
David Howells84aabd42014-07-01 16:40:19 +010019 struct public_key_signature sig; /* Signature parameters */
David Howellsc26fd692012-09-24 17:11:48 +010020 char *issuer; /* Name of certificate issuer */
21 char *subject; /* Name of certificate subject */
David Howellsb92e6572015-07-20 21:16:26 +010022 struct asymmetric_key_id *id; /* Issuer + Serial number */
Dmitry Kasatkin8dd60982014-10-06 16:52:12 +010023 struct asymmetric_key_id *skid; /* Subject + subjectKeyId (optional) */
David Howellsb92e6572015-07-20 21:16:26 +010024 struct asymmetric_key_id *akid_id; /* CA AuthKeyId matching ->id (optional) */
25 struct asymmetric_key_id *akid_skid; /* CA AuthKeyId matching ->skid (optional) */
David Howellsfd19a3d2015-07-29 16:58:32 +010026 time64_t valid_from;
27 time64_t valid_to;
David Howellsc26fd692012-09-24 17:11:48 +010028 const void *tbs; /* Signed data */
David Howellsb426beb2013-08-30 16:18:02 +010029 unsigned tbs_size; /* Size of signed data */
30 unsigned raw_sig_size; /* Size of sigature */
31 const void *raw_sig; /* Signature data */
David Howells84aabd42014-07-01 16:40:19 +010032 const void *raw_serial; /* Raw serial number in ASN.1 */
33 unsigned raw_serial_size;
34 unsigned raw_issuer_size;
35 const void *raw_issuer; /* Raw issuer name in ASN.1 */
36 const void *raw_subject; /* Raw subject name in ASN.1 */
37 unsigned raw_subject_size;
David Howellsdd2f6c42014-10-03 16:17:02 +010038 unsigned raw_skid_size;
39 const void *raw_skid; /* Raw subjectKeyId in ASN.1 */
David Howells84aabd42014-07-01 16:40:19 +010040 unsigned index;
41 bool seen; /* Infinite recursion prevention */
42 bool verified;
43 bool trusted;
David Howells41559422014-09-16 17:36:15 +010044 bool unsupported_crypto; /* T if can't be verified due to missing crypto */
David Howellsc26fd692012-09-24 17:11:48 +010045};
46
47/*
48 * x509_cert_parser.c
49 */
50extern void x509_free_certificate(struct x509_certificate *cert);
51extern struct x509_certificate *x509_cert_parse(const void *data, size_t datalen);
David Howellsfd19a3d2015-07-29 16:58:32 +010052extern int x509_decode_time(time64_t *_t, size_t hdrlen,
53 unsigned char tag,
54 const unsigned char *value, size_t vlen);
David Howellsb426beb2013-08-30 16:18:02 +010055
56/*
57 * x509_public_key.c
58 */
59extern int x509_get_sig_params(struct x509_certificate *cert);
60extern int x509_check_signature(const struct public_key *pub,
61 struct x509_certificate *cert);